Acknowledgement
Supported by : 성신여자대학교
References
- Jeong, H. and Lee, D.H., The evolution of the Internet of Things and Policy Suggestions, KISDI Premium Report (2014)
- J.H.Lee., IoT Security Issues and Implications, ICT Spot Issue, (2015) 07, IITP, pp.15-24
- Opinion 8/2014 on the on Recent Developments on the Internet of Things(WP29), http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf, Sep (2014)
- https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf, Jan (2015)
- Ministry of Science, ICT and Future Planning, http://www.msip.go.kr (2015)
- Kyoung-Sik Min, Global Trends on privacy in the IoT environment, IITP Weekly ICT Issue, (2015), Vol.1700, pp.12-23.
- Jeong junhyeon, Kwon Ohmin, "A Strudy of Legal Issue Collection-Processing-Third party Providing of Personal Data and Their Value Adding", Hongik Law Review (2015), Vol. 16, No.1,pp.937-960 https://doi.org/10.16960/jhlr.16.1.201502.937
- Woo-Joon JEONG, "A Study on Legal and Institutional Improvement Measures to Promote the Internet of Things", The Korea Law Professors Association (2014), Vol14, No.4,pp.1835-1867
- Bong-Im Jang, Chang-Su Kim, A study on the Security Technology for the Internet of Things, Journal of Security Engineering, (2014), Vol.11, No.5, pp.429-438. https://doi.org/10.14257/jse.2014.10.05
- Israa Alqassem, Privacy and Security Requirements Framework for the Internet of Things. Companion Proceedings of the 36th International Conference on Software Engineering, (2014), July 4; Hyderabad, India
- Zhi-Kai Zhang, Michael Cheng Yi Cho, Shiupyng Shieh, Emerging Security Threats and Countermeasures in IoT. ASIA CCS '15 Proceedings of the 10th ACM Symposium on Information, Computer and communications Security, (2015), April 14-17; Singapore
- Jun Jung Hun, Security Technology, Threats and Trends in the Internet of Things, Convergence Security Journal, (2014), Vol.14, No.7, pp.4-12.
- ENISA(European Union Agency for Network and Information Security), "Privacy and Data Protection by Design-from policy ro engineering" (2014)
- Ministry of Science, Internet of Things Information Security Roadmap implementation plan for three years, http://www.msip.go.kr (2015)
- Naver privacy column, http://privacyblog.naver.com/220427876061 (2015)
Cited by
- Regulations and Government Legislations Issues for Internet of Things vol.24, pp.1, 2018, https://doi.org/10.32430/ilst.2018.24.1.43
- 소비자의 사물인터넷 서비스 경험과 수용의도 : 네트워크 외부성을 중심으로 vol.17, pp.10, 2019, https://doi.org/10.14400/jdc.2019.17.10.177
- 사물인터넷 쇼핑의 편리성과 소비자 알 권리 중요도: 아마존 대시 버튼 사례 연구 vol.24, pp.4, 2016, https://doi.org/10.12940/jfb.2020.24.4.85